The quiet threat: Fighting industrial espionage in America

William A Stadler
<span title="2012-01-30">2012</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="" style="color: black;">Security Journal</a> </i> &nbsp;
In a world where intellectual property crime and victimization are becoming more prevalent because of mass communication and technological advances, Ronald L. Mendell ' s updated contribution to the world of industrial espionage is particularly timely and important. Since Charles C. Thomas Publisher Ltd. fi rst published The Quiet Threat: Fighting Industrial Espionage in America ( 2nd edition ) in 2003, great advancements have been made with respect to information technology, corporate
more &raquo; ... ng and the transience, as well as erosion, of intellectual capital. As a result, real-time data management and security concerns have emerged as a clear and present danger to corporations and governments alike. Similarly, intellectual property crime and industrial espionage have garnered increasing interest among criminologists and researchers, particularly because the incidence and prevalence of these crimes are heavily infl uenced by fast-paced changes in technology. The Quiet Threat is a book that appears to be particularly focused on introducing readers to the concept of industrial espionage as a silent, enigmatic foe, which poses a signifi cant threat to the competitive position of modern corporations and economic strength of powerful nations. Throughout the text, Mendell discusses several different facets of industrial espionage from both a historical and practical point of view. However, the book is not laid out chronologically from past to present, following a clear or linear path. Instead, the book presents and discusses practical concepts that are relevant to acts of industrial espionage and those who are entrusted with providing information security. Later, the text circles back on important concepts through an examination of information gathering tactics and techniques, which have been used throughout history, along with some of the processes that are related to the pervasiveness of espionage at present. Discussion topics, exercises and questions, as well as a list of further readings, can also be found at the end of each chapter to extend each reader ' s experience beyond the pages of the text. These additions to each chapter present the reader with an opportunity for further refl ection on and guided preparation for prevailing security concerns. After a brief introductory discussion of the paradoxical nature of information security in the modern era, Chapter 1 begins by familiarizing readers with the use of visual observations as a general technique of gathering data, through either legal or illegal channels. Mendell implicates individual powers of observation in the important process of detecting, identifying and deconstructing the meaning behind various types of information. Throughout this
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="">doi:10.1057/sj.2011.26</a> <a target="_blank" rel="external noopener" href="">fatcat:olpvipfrlvglzjl6c2hq26ks4y</a> </span>
<a target="_blank" rel="noopener" href="" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href=""> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / </button> </a>